diff options
author | Ashlee Young <ashlee@onosfw.com> | 2015-09-09 22:21:41 -0700 |
---|---|---|
committer | Ashlee Young <ashlee@onosfw.com> | 2015-09-09 22:21:41 -0700 |
commit | 8879b125d26e8db1a5633de5a9c692eb2d1c4f83 (patch) | |
tree | c7259d85a991b83dfa85ab2e339360669fc1f58e /framework/src/suricata/src/detect-engine-iponly.c | |
parent | 13d05bc8458758ee39cb829098241e89616717ee (diff) |
suricata checkin based on commit id a4bce14770beee46a537eda3c3f6e8e8565d5d0a
Change-Id: I9a214fa0ee95e58fc640e50bd604dac7f42db48f
Diffstat (limited to 'framework/src/suricata/src/detect-engine-iponly.c')
-rw-r--r-- | framework/src/suricata/src/detect-engine-iponly.c | 2321 |
1 files changed, 2321 insertions, 0 deletions
diff --git a/framework/src/suricata/src/detect-engine-iponly.c b/framework/src/suricata/src/detect-engine-iponly.c new file mode 100644 index 00000000..06983fc0 --- /dev/null +++ b/framework/src/suricata/src/detect-engine-iponly.c @@ -0,0 +1,2321 @@ +/* Copyright (C) 2007-2010 Open Information Security Foundation + * + * You can copy, redistribute or modify this Program under the terms of + * the GNU General Public License version 2 as published by the Free + * Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * version 2 along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA + * 02110-1301, USA. + */ + +/** + * \file + * + * \author Victor Julien <victor@inliniac.net> + * \author Pablo Rincon Crespo <pablo.rincon.crespo@gmail.com> + * + * Signatures that only inspect IP addresses are processed here + * We use radix trees for src dst ipv4 and ipv6 adresses + * This radix trees hold information for subnets and hosts in a + * hierarchical distribution + */ + +#include "suricata-common.h" +#include "debug.h" +#include "detect.h" +#include "decode.h" +#include "flow.h" + +#include "detect-parse.h" +#include "detect-engine.h" + +#include "detect-engine-siggroup.h" +#include "detect-engine-address.h" +#include "detect-engine-proto.h" +#include "detect-engine-port.h" +#include "detect-engine-mpm.h" + +#include "detect-engine-threshold.h" +#include "detect-engine-iponly.h" +#include "detect-threshold.h" +#include "util-classification-config.h" +#include "util-rule-vars.h" + +#include "flow-util.h" +#include "util-debug.h" +#include "util-unittest.h" +#include "util-unittest-helper.h" +#include "util-print.h" +#include "util-profiling.h" + +#ifdef OS_WIN32 +#include <winsock.h> +#else +#include <netinet/in.h> +#endif /* OS_WIN32 */ + +/** + * \brief This function creates a new IPOnlyCIDRItem + * + * \retval IPOnlyCIDRItem address of the new instance + */ +static IPOnlyCIDRItem *IPOnlyCIDRItemNew() +{ + SCEnter(); + IPOnlyCIDRItem *item = NULL; + + item = SCMalloc(sizeof(IPOnlyCIDRItem)); + if (unlikely(item == NULL)) + SCReturnPtr(NULL, "IPOnlyCIDRItem"); + memset(item, 0, sizeof(IPOnlyCIDRItem)); + + SCReturnPtr(item, "IPOnlyCIDRItem"); +} + +static uint8_t IPOnlyCIDRItemCompare(IPOnlyCIDRItem *head, + IPOnlyCIDRItem *item) +{ + uint8_t i = 0; + for (; i < head->netmask / 32 || i < 1; i++) { + if (item->ip[i] < head->ip[i]) + //if (*(uint8_t *)(item->ip + i) < *(uint8_t *)(head->ip + i)) + return 1; + } + return 0; +} + +/** + * \internal + * \brief Parses an ipv4/ipv6 address string and updates the result into the + * IPOnlyCIDRItem instance sent as the argument. + * + * \param dd Pointer to the IPOnlyCIDRItem instance which should be updated with + * the address (in cidr) details from the parsed ip string. + * \param str Pointer to address string that has to be parsed. + * + * \retval 0 On successfully parsing the address string. + * \retval -1 On failure. + */ +static int IPOnlyCIDRItemParseSingle(IPOnlyCIDRItem *dd, char *str) +{ + char buf[256] = ""; + char *ip = NULL, *ip2 = NULL; + char *mask = NULL; + int r = 0; + + while (*str != '\0' && *str == ' ') + str++; + + SCLogDebug("str %s", str); + strlcpy(buf, str, sizeof(buf)); + ip = buf; + + /* first handle 'any' */ + if (strcasecmp(str, "any") == 0) { + /* if any, insert 0.0.0.0/0 and ::/0 as well */ + SCLogDebug("adding 0.0.0.0/0 and ::/0 as we\'re handling \'any\'"); + + IPOnlyCIDRItemParseSingle(dd, "0.0.0.0/0"); + BUG_ON(dd->family == 0); + + dd->next = IPOnlyCIDRItemNew(); + if (dd->next == NULL) + goto error; + + IPOnlyCIDRItemParseSingle(dd->next, "::/0"); + BUG_ON(dd->family == 0); + + SCLogDebug("address is \'any\'"); + return 0; + } + + /* handle the negation case */ + if (ip[0] == '!') { + dd->negated = (dd->negated)? 0 : 1; + ip++; + } + + /* see if the address is an ipv4 or ipv6 address */ + if ((strchr(str, ':')) == NULL) { + /* IPv4 Address */ + struct in_addr in; + + dd->family = AF_INET; + + if ((mask = strchr(ip, '/')) != NULL) { + /* 1.2.3.4/xxx format (either dotted or cidr notation */ + ip[mask - ip] = '\0'; + mask++; + uint32_t netmask = 0; + size_t u = 0; + + if ((strchr (mask, '.')) == NULL) { + /* 1.2.3.4/24 format */ + + for (u = 0; u < strlen(mask); u++) { + if(!isdigit((unsigned char)mask[u])) + goto error; + } + + int cidr = atoi(mask); + if (cidr < 0 || cidr > 32) + goto error; + + dd->netmask = cidr; + } else { + /* 1.2.3.4/255.255.255.0 format */ + r = inet_pton(AF_INET, mask, &in); + if (r <= 0) + goto error; + + netmask = in.s_addr; + + /* Extract cidr netmask */ + while ((0x01 & netmask) == 0) { + dd->netmask++; + netmask = netmask >> 1; + } + dd->netmask = 32 - dd->netmask; + } + + r = inet_pton(AF_INET, ip, &in); + if (r <= 0) + goto error; + + dd->ip[0] = in.s_addr; + + } else if ((ip2 = strchr(ip, '-')) != NULL) { + /* 1.2.3.4-1.2.3.6 range format */ + ip[ip2 - ip] = '\0'; + ip2++; + + uint32_t tmp_ip[4]; + uint32_t tmp_ip2[4]; + uint32_t first, last; + + r = inet_pton(AF_INET, ip, &in); + if (r <= 0) + goto error; + tmp_ip[0] = in.s_addr; + + r = inet_pton(AF_INET, ip2, &in); + if (r <= 0) + goto error; + tmp_ip2[0] = in.s_addr; + + /* a > b is illegal, a = b is ok */ + if (ntohl(tmp_ip[0]) > ntohl(tmp_ip2[0])) + goto error; + + first = ntohl(tmp_ip[0]); + last = ntohl(tmp_ip2[0]); + + dd->netmask = 32; + dd->ip[0] =htonl(first); + + if (first < last) { + for (first++; first <= last; first++) { + IPOnlyCIDRItem *new = IPOnlyCIDRItemNew(); + if (new == NULL) + goto error; + dd->next = new; + new->negated = dd->negated; + new->family= dd->family; + new->netmask = dd->netmask; + new->ip[0] = htonl(first); + dd = dd->next; + } + } + + } else { + /* 1.2.3.4 format */ + r = inet_pton(AF_INET, ip, &in); + if (r <= 0) + goto error; + + /* single host */ + dd->ip[0] = in.s_addr; + dd->netmask = 32; + } + } else { + /* IPv6 Address */ + struct in6_addr in6; + uint32_t ip6addr[4]; + + dd->family = AF_INET6; + + if ((mask = strchr(ip, '/')) != NULL) { + mask[0] = '\0'; + mask++; + + r = inet_pton(AF_INET6, ip, &in6); + if (r <= 0) + goto error; + + /* Format is cidr val */ + dd->netmask = atoi(mask); + + memcpy(dd->ip, &in6.s6_addr, sizeof(ip6addr)); + } else { + r = inet_pton(AF_INET6, ip, &in6); + if (r <= 0) + goto error; + + memcpy(dd->ip, &in6.s6_addr, sizeof(dd->ip)); + dd->netmask = 128; + } + + } + + BUG_ON(dd->family == 0); + return 0; + +error: + return -1; +} + +/** + * \brief Setup a single address string, parse it and add the resulting + * Address items in cidr format to the list of gh + * + * \param gh Pointer to the IPOnlyCIDRItem list Head to which the + * resulting Address-Range(s) from the parsed ip string has to + * be added. + * \param s Pointer to the ip address string to be parsed. + * + * \retval 0 On success. + * \retval -1 On failure. + */ +static int IPOnlyCIDRItemSetup(IPOnlyCIDRItem *gh, char *s) +{ + SCLogDebug("gh %p, s %s", gh, s); + + /* parse the address */ + if (IPOnlyCIDRItemParseSingle(gh, s) == -1) { + SCLogError(SC_ERR_ADDRESS_ENGINE_GENERIC, + "DetectAddressParse error \"%s\"", s); + goto error; + } + + return 0; + +error: + return -1; +} + + +/** + * \brief This function insert a IPOnlyCIDRItem + * to a list of IPOnlyCIDRItems sorted by netmask + * ascending + * \param head Pointer to the head of IPOnlyCIDRItems list + * \param item Pointer to the item to insert in the list + * + * \retval IPOnlyCIDRItem address of the new head if apply + */ +static IPOnlyCIDRItem *IPOnlyCIDRItemInsertReal(IPOnlyCIDRItem *head, + IPOnlyCIDRItem *item) +{ + IPOnlyCIDRItem *it, *prev = NULL; + + if (item == NULL) + return head; + + /* Compare with the head */ + if (item->netmask < head->netmask || (item->netmask == head->netmask && IPOnlyCIDRItemCompare(head, item))) { + item->next = head; + return item; + } + + if (item->netmask == head->netmask && !IPOnlyCIDRItemCompare(head, item)) { + item->next = head->next; + head->next = item; + return head; + } + + for (prev = it = head; + it != NULL && it->netmask < item->netmask; + it = it->next) + prev = it; + + if (it == NULL) { + prev->next = item; + item->next = NULL; + } else { + item->next = it; + prev->next = item; + } + + return head; +} + +/** + * \brief This function insert a IPOnlyCIDRItem list + * to a list of IPOnlyCIDRItems sorted by netmask + * ascending + * \param head Pointer to the head of IPOnlyCIDRItems list + * \param item Pointer to the list of items to insert in the list + * + * \retval IPOnlyCIDRItem address of the new head if apply + */ +static IPOnlyCIDRItem *IPOnlyCIDRItemInsert(IPOnlyCIDRItem *head, + IPOnlyCIDRItem *item) +{ + IPOnlyCIDRItem *it, *prev = NULL; + + /* The first element */ + if (head == NULL) { + SCLogDebug("Head is NULL to insert item (%p)",item); + return item; + } + + if (item == NULL) { + SCLogDebug("Item is NULL"); + return head; + } + + SCLogDebug("Inserting item(%p)->netmask %u head %p", item, item->netmask, head); + + prev = item; + while (prev != NULL) { + it = prev->next; + + /* Separate from the item list */ + prev->next = NULL; + + //SCLogDebug("Before:"); + //IPOnlyCIDRListPrint(head); + head = IPOnlyCIDRItemInsertReal(head, prev); + //SCLogDebug("After:"); + //IPOnlyCIDRListPrint(head); + prev = it; + } + + return head; +} + +/** + * \brief This function free a IPOnlyCIDRItem list + * \param tmphead Pointer to the list + */ +void IPOnlyCIDRListFree(IPOnlyCIDRItem *tmphead) +{ + SCEnter(); + uint32_t i = 0; + + IPOnlyCIDRItem *it, *next = NULL; + + if (tmphead == NULL) { + SCLogDebug("temphead is NULL"); + return; + } + + it = tmphead; + next = it->next; + + while (it != NULL) { + i++; + SCFree(it); + SCLogDebug("Item(%p) %"PRIu32" removed\n", it, i); + it = next; + + if (next != NULL) + next = next->next; + } + SCReturn; +} + +/** + * \brief This function update a list of IPOnlyCIDRItems + * setting the signature internal id (signum) to "i" + * + * \param tmphead Pointer to the list + * \param i number of signature internal id + */ +static void IPOnlyCIDRListSetSigNum(IPOnlyCIDRItem *tmphead, SigIntId i) +{ + while (tmphead != NULL) { + tmphead->signum = i; + tmphead = tmphead->next; + } +} + +#ifdef UNITTESTS +/** + * \brief This function print a IPOnlyCIDRItem list + * \param tmphead Pointer to the head of IPOnlyCIDRItems list + */ +static void IPOnlyCIDRListPrint(IPOnlyCIDRItem *tmphead) +{ + uint32_t i = 0; + + while (tmphead != NULL) { + i++; + SCLogDebug("Item %"PRIu32" has netmask %"PRIu16" negated:" + " %s; IP: %s; signum: %"PRIu16, i, tmphead->netmask, + (tmphead->negated) ? "yes":"no", + inet_ntoa(*(struct in_addr*)&tmphead->ip[0]), + tmphead->signum); + tmphead = tmphead->next; + } +} +#endif + +/** + * \brief This function print a SigNumArray, it's used with the + * radix tree print function to help debugging + * \param tmp Pointer to the head of SigNumArray + */ +static void SigNumArrayPrint(void *tmp) +{ + SigNumArray *sna = (SigNumArray *)tmp; + uint32_t u; + + for (u = 0; u < sna->size; u++) { + uint8_t bitarray = sna->array[u]; + uint8_t i = 0; + + for (; i < 8; i++) { + if (bitarray & 0x01) + printf(", %"PRIu32"", u * 8 + i); + else + printf(", "); + + bitarray = bitarray >> 1; + } + } +} + +/** + * \brief This function creates a new SigNumArray with the + * size fixed to the io_ctx->max_idx + * \param de_ctx Pointer to the current detection context + * \param io_ctx Pointer to the current ip only context + * + * \retval SigNumArray address of the new instance + */ +static SigNumArray *SigNumArrayNew(DetectEngineCtx *de_ctx, + DetectEngineIPOnlyCtx *io_ctx) +{ + SigNumArray *new = SCMalloc(sizeof(SigNumArray)); + + if (unlikely(new == NULL)) { + SCLogError(SC_ERR_FATAL, "Fatal error encountered in SigNumArrayNew. Exiting..."); + exit(EXIT_FAILURE); + } + memset(new, 0, sizeof(SigNumArray)); + + new->array = SCMalloc(io_ctx->max_idx / 8 + 1); + if (new->array == NULL) { + exit(EXIT_FAILURE); + } + + memset(new->array, 0, io_ctx->max_idx / 8 + 1); + new->size = io_ctx->max_idx / 8 + 1; + + SCLogDebug("max idx= %u", io_ctx->max_idx); + + return new; +} + +/** + * \brief This function creates a new SigNumArray with the + * same data as the argument + * + * \param orig Pointer to the original SigNumArray to copy + * + * \retval SigNumArray address of the new instance + */ +static SigNumArray *SigNumArrayCopy(SigNumArray *orig) +{ + SigNumArray *new = SCMalloc(sizeof(SigNumArray)); + + if (unlikely(new == NULL)) { + SCLogError(SC_ERR_FATAL, "Fatal error encountered in SigNumArrayCopy. Exiting..."); + exit(EXIT_FAILURE); + } + + memset(new, 0, sizeof(SigNumArray)); + new->size = orig->size; + + new->array = SCMalloc(orig->size); + if (new->array == NULL) { + exit(EXIT_FAILURE); + } + + memcpy(new->array, orig->array, orig->size); + return new; +} + +/** + * \brief This function free() a SigNumArray + * \param orig Pointer to the original SigNumArray to copy + */ +static void SigNumArrayFree(void *tmp) +{ + SigNumArray *sna = (SigNumArray *)tmp; + + if (sna == NULL) + return; + + if (sna->array != NULL) + SCFree(sna->array); + + SCFree(sna); +} + +/** + * \brief This function parses and return a list of IPOnlyCIDRItem + * + * \param s Pointer to the string of the addresses + * (in the format of signatures) + * \param negate flag to indicate if all this string is negated or not + * + * \retval 0 if success + * \retval -1 if fails + */ +static IPOnlyCIDRItem *IPOnlyCIDRListParse2(const DetectEngineCtx *de_ctx, + char *s, int negate) +{ + size_t x = 0; + size_t u = 0; + int o_set = 0, n_set = 0, d_set = 0; + int depth = 0; + size_t size = strlen(s); + char address[8196] = ""; + char *rule_var_address = NULL; + char *temp_rule_var_address = NULL; + IPOnlyCIDRItem *head; + IPOnlyCIDRItem *subhead; + head = subhead = NULL; + + SCLogDebug("s %s negate %s", s, negate ? "true" : "false"); + + for (u = 0, x = 0; u < size && x < sizeof(address); u++) { + address[x] = s[u]; + x++; + + if (!o_set && s[u] == '!') { + n_set = 1; + x--; + } else if (s[u] == '[') { + if (!o_set) { + o_set = 1; + x = 0; + } + depth++; + } else if (s[u] == ']') { + if (depth == 1) { + address[x - 1] = '\0'; + x = 0; + + if ( (subhead = IPOnlyCIDRListParse2(de_ctx, address, + (negate + n_set) % 2)) == NULL) + goto error; + + head = IPOnlyCIDRItemInsert(head, subhead); + n_set = 0; + } + depth--; + } else if (depth == 0 && s[u] == ',') { + if (o_set == 1) { + o_set = 0; + } else if (d_set == 1) { + address[x - 1] = '\0'; + + rule_var_address = SCRuleVarsGetConfVar(de_ctx, address, + SC_RULE_VARS_ADDRESS_GROUPS); + if (rule_var_address == NULL) + goto error; + + temp_rule_var_address = rule_var_address; + if ((negate + n_set) % 2) { + temp_rule_var_address = SCMalloc(strlen(rule_var_address) + 3); + + if (unlikely(temp_rule_var_address == NULL)) { + goto error; + } + + snprintf(temp_rule_var_address, strlen(rule_var_address) + 3, + "[%s]", rule_var_address); + } + + subhead = IPOnlyCIDRListParse2(de_ctx, temp_rule_var_address, + (negate + n_set) % 2); + head = IPOnlyCIDRItemInsert(head, subhead); + + d_set = 0; + n_set = 0; + + if (temp_rule_var_address != rule_var_address) + SCFree(temp_rule_var_address); + + } else { + address[x - 1] = '\0'; + + subhead = IPOnlyCIDRItemNew(); + if (subhead == NULL) + goto error; + + if (!((negate + n_set) % 2)) + subhead->negated = 0; + else + subhead->negated = 1; + + if (IPOnlyCIDRItemSetup(subhead, address) < 0) { + IPOnlyCIDRListFree(subhead); + subhead = NULL; + goto error; + } + head = IPOnlyCIDRItemInsert(head, subhead); + + n_set = 0; + } + x = 0; + } else if (depth == 0 && s[u] == '$') { + d_set = 1; + } else if (depth == 0 && u == size - 1) { + if (x == sizeof(address)) { + address[x - 1] = '\0'; + } else { + address[x] = '\0'; + } + x = 0; + + if (d_set == 1) { + rule_var_address = SCRuleVarsGetConfVar(de_ctx, address, + SC_RULE_VARS_ADDRESS_GROUPS); + if (rule_var_address == NULL) + goto error; + + temp_rule_var_address = rule_var_address; + if ((negate + n_set) % 2) { + temp_rule_var_address = SCMalloc(strlen(rule_var_address) + 3); + if (unlikely(temp_rule_var_address == NULL)) { + goto error; + } + snprintf(temp_rule_var_address, strlen(rule_var_address) + 3, + "[%s]", rule_var_address); + } + subhead = IPOnlyCIDRListParse2(de_ctx, temp_rule_var_address, + (negate + n_set) % 2); + head = IPOnlyCIDRItemInsert(head, subhead); + + d_set = 0; + + if (temp_rule_var_address != rule_var_address) + SCFree(temp_rule_var_address); + } else { + subhead = IPOnlyCIDRItemNew(); + if (subhead == NULL) + goto error; + + if (!((negate + n_set) % 2)) + subhead->negated = 0; + else + subhead->negated = 1; + + if (IPOnlyCIDRItemSetup(subhead, address) < 0) { + IPOnlyCIDRListFree(subhead); + subhead = NULL; + goto error; + } + head = IPOnlyCIDRItemInsert(head, subhead); + } + n_set = 0; + } + } + + return head; + +error: + SCLogError(SC_ERR_ADDRESS_ENGINE_GENERIC,"Error parsing addresses"); + return head; +} + + +/** + * \brief Parses an address group sent as a character string and updates the + * IPOnlyCIDRItem list + * + * \param gh Pointer to the IPOnlyCIDRItem list + * \param str Pointer to the character string containing the address group + * that has to be parsed. + * + * \retval 0 On success. + * \retval -1 On failure. + */ +static int IPOnlyCIDRListParse(const DetectEngineCtx *de_ctx, + IPOnlyCIDRItem **gh, char *str) +{ + SCLogDebug("gh %p, str %s", gh, str); + + if (gh == NULL) + goto error; + + *gh = IPOnlyCIDRListParse2(de_ctx, str, 0); + if (*gh == NULL) { + SCLogDebug("DetectAddressParse2 returned null"); + goto error; + } + + return 0; + +error: + return -1; +} + +/** + * \brief Parses an address group sent as a character string and updates the + * IPOnlyCIDRItem lists src and dst of the Signature *s + * + * \param s Pointer to the signature structure + * \param addrstr Pointer to the character string containing the address group + * that has to be parsed. + * \param flag to indicate if we are parsing the src string or the dst string + * + * \retval 0 On success. + * \retval -1 On failure. + */ +int IPOnlySigParseAddress(const DetectEngineCtx *de_ctx, + Signature *s, const char *addrstr, char flag) +{ + SCLogDebug("Address Group \"%s\" to be parsed now", addrstr); + IPOnlyCIDRItem *tmp = NULL; + + /* pass on to the address(list) parser */ + if (flag == 0) { + if (strcasecmp(addrstr, "any") == 0) { + s->flags |= SIG_FLAG_SRC_ANY; + + if (IPOnlyCIDRListParse(de_ctx, &s->CidrSrc, (char *)"0.0.0.0/0") < 0) + goto error; + + if (IPOnlyCIDRListParse(de_ctx, &tmp, (char *)"::/0") < 0) + goto error; + + s->CidrSrc = IPOnlyCIDRItemInsert(s->CidrSrc, tmp); + + } else if (IPOnlyCIDRListParse(de_ctx, &s->CidrSrc, (char *)addrstr) < 0) { + goto error; + } + + /* IPOnlyCIDRListPrint(s->CidrSrc); */ + } else { + if (strcasecmp(addrstr, "any") == 0) { + s->flags |= SIG_FLAG_DST_ANY; + + if (IPOnlyCIDRListParse(de_ctx, &tmp, (char *)"0.0.0.0/0") < 0) + goto error; + + if (IPOnlyCIDRListParse(de_ctx, &s->CidrDst, (char *)"::/0") < 0) + goto error; + + s->CidrDst = IPOnlyCIDRItemInsert(s->CidrDst, tmp); + + } else if (IPOnlyCIDRListParse(de_ctx, &s->CidrDst, (char *)addrstr) < 0) { + goto error; + } + + /* IPOnlyCIDRListPrint(s->CidrDst); */ + } + + return 0; + +error: + SCLogError(SC_ERR_ADDRESS_ENGINE_GENERIC, "failed to parse addresses"); + return -1; +} + +/** + * \brief Setup the IP Only detection engine context + * + * \param de_ctx Pointer to the current detection engine + * \param io_ctx Pointer to the current ip only detection engine + */ +void IPOnlyInit(DetectEngineCtx *de_ctx, DetectEngineIPOnlyCtx *io_ctx) +{ + io_ctx->sig_init_size = DetectEngineGetMaxSigId(de_ctx) / 8 + 1; + + if ( (io_ctx->sig_init_array = SCMalloc(io_ctx->sig_init_size)) == NULL) { + SCLogError(SC_ERR_FATAL, "Fatal error encountered in IPOnlyInit. Exiting..."); + exit(EXIT_FAILURE); + } + + memset(io_ctx->sig_init_array, 0, io_ctx->sig_init_size); + + io_ctx->tree_ipv4src = SCRadixCreateRadixTree(SigNumArrayFree, + SigNumArrayPrint); + io_ctx->tree_ipv4dst = SCRadixCreateRadixTree(SigNumArrayFree, + SigNumArrayPrint); + io_ctx->tree_ipv6src = SCRadixCreateRadixTree(SigNumArrayFree, + SigNumArrayPrint); + io_ctx->tree_ipv6dst = SCRadixCreateRadixTree(SigNumArrayFree, + SigNumArrayPrint); +} + +/** + * \brief Setup the IP Only thread detection engine context + * + * \param de_ctx Pointer to the current detection engine + * \param io_ctx Pointer to the current ip only thread detection engine + */ +void DetectEngineIPOnlyThreadInit(DetectEngineCtx *de_ctx, + DetectEngineIPOnlyThreadCtx *io_tctx) +{ + /* initialize the signature bitarray */ + io_tctx->sig_match_size = de_ctx->io_ctx.max_idx / 8 + 1; + io_tctx->sig_match_array = SCMalloc(io_tctx->sig_match_size); + if (io_tctx->sig_match_array == NULL) { + exit(EXIT_FAILURE); + } + + memset(io_tctx->sig_match_array, 0, io_tctx->sig_match_size); +} + +/** + * \brief Print stats of the IP Only engine + * + * \param de_ctx Pointer to the current detection engine + * \param io_ctx Pointer to the current ip only detection engine + */ +void IPOnlyPrint(DetectEngineCtx *de_ctx, DetectEngineIPOnlyCtx *io_ctx) +{ + /* XXX: how are we going to print the stats now? */ +} + +/** + * \brief Deinitialize the IP Only detection engine context + * + * \param de_ctx Pointer to the current detection engine + * \param io_ctx Pointer to the current ip only detection engine + */ +void IPOnlyDeinit(DetectEngineCtx *de_ctx, DetectEngineIPOnlyCtx *io_ctx) +{ + + if (io_ctx == NULL) + return; + + if (io_ctx->tree_ipv4src != NULL) + SCRadixReleaseRadixTree(io_ctx->tree_ipv4src); + io_ctx->tree_ipv4src = NULL; + + if (io_ctx->tree_ipv4dst != NULL) + SCRadixReleaseRadixTree(io_ctx->tree_ipv4dst); + io_ctx->tree_ipv4dst = NULL; + + if (io_ctx->tree_ipv6src != NULL) + SCRadixReleaseRadixTree(io_ctx->tree_ipv6src); + io_ctx->tree_ipv6src = NULL; + + if (io_ctx->tree_ipv6dst != NULL) + SCRadixReleaseRadixTree(io_ctx->tree_ipv6dst); + io_ctx->tree_ipv6dst = NULL; + + if (io_ctx->sig_init_array) + SCFree(io_ctx->sig_init_array); + io_ctx->sig_init_array = NULL; +} + +/** + * \brief Deinitialize the IP Only thread detection engine context + * + * \param de_ctx Pointer to the current detection engine + * \param io_ctx Pointer to the current ip only detection engine + */ +void DetectEngineIPOnlyThreadDeinit(DetectEngineIPOnlyThreadCtx *io_tctx) +{ + SCFree(io_tctx->sig_match_array); +} + +static inline +int IPOnlyMatchCompatSMs(ThreadVars *tv, + DetectEngineThreadCtx *det_ctx, + Signature *s, Packet *p) +{ + KEYWORD_PROFILING_SET_LIST(det_ctx, DETECT_SM_LIST_MATCH); + SigMatch *sm = s->sm_lists[DETECT_SM_LIST_MATCH]; + + while (sm != NULL) { + BUG_ON(!(sigmatch_table[sm->type].flags & SIGMATCH_IPONLY_COMPAT)); + KEYWORD_PROFILING_START; + if (sigmatch_table[sm->type].Match(tv, det_ctx, p, s, sm->ctx) > 0) { + KEYWORD_PROFILING_END(det_ctx, sm->type, 1); + sm = sm->next; + continue; + } + KEYWORD_PROFILING_END(det_ctx, sm->type, 0); + return 0; + } + + return 1; +} + +/** + * \brief Match a packet against the IP Only detection engine contexts + * + * \param de_ctx Pointer to the current detection engine + * \param io_ctx Pointer to the current ip only detection engine + * \param io_ctx Pointer to the current ip only thread detection engine + * \param p Pointer to the Packet to match against + */ +void IPOnlyMatchPacket(ThreadVars *tv, + DetectEngineCtx *de_ctx, + DetectEngineThreadCtx *det_ctx, + DetectEngineIPOnlyCtx *io_ctx, + DetectEngineIPOnlyThreadCtx *io_tctx, Packet *p) +{ + SigNumArray *src = NULL; + SigNumArray *dst = NULL; + void *user_data_src = NULL, *user_data_dst = NULL; + + if (p->src.family == AF_INET) { + (void)SCRadixFindKeyIPV4BestMatch((uint8_t *)&GET_IPV4_SRC_ADDR_U32(p), + io_ctx->tree_ipv4src, &user_data_src); + } else if (p->src.family == AF_INET6) { + (void)SCRadixFindKeyIPV6BestMatch((uint8_t *)&GET_IPV6_SRC_ADDR(p), + io_ctx->tree_ipv6src, &user_data_src); + } + + if (p->dst.family == AF_INET) { + (void)SCRadixFindKeyIPV4BestMatch((uint8_t *)&GET_IPV4_DST_ADDR_U32(p), + io_ctx->tree_ipv4dst, &user_data_dst); + } else if (p->dst.family == AF_INET6) { + (void)SCRadixFindKeyIPV6BestMatch((uint8_t *)&GET_IPV6_DST_ADDR(p), + io_ctx->tree_ipv6dst, &user_data_dst); + } + + src = user_data_src; + dst = user_data_dst; + + if (src == NULL || dst == NULL) + return; + + uint32_t u; + for (u = 0; u < src->size; u++) { + SCLogDebug("And %"PRIu8" & %"PRIu8, src->array[u], dst->array[u]); + + /* The final results will be at io_tctx */ + io_tctx->sig_match_array[u] = dst->array[u] & src->array[u]; + + /* We have to move the logic of the signature checking + * to the main detect loop, in order to apply the + * priority of actions (pass, drop, reject, alert) */ + if (io_tctx->sig_match_array[u] != 0) { + /* We have a match :) Let's see from which signum's */ + uint8_t bitarray = io_tctx->sig_match_array[u]; + uint8_t i = 0; + + for (; i < 8; i++, bitarray = bitarray >> 1) { + if (bitarray & 0x01) { + Signature *s = de_ctx->sig_array[u * 8 + i]; + + if ((s->proto.flags & DETECT_PROTO_IPV4) && !PKT_IS_IPV4(p)) { + SCLogDebug("ip version didn't match"); + continue; + } + if ((s->proto.flags & DETECT_PROTO_IPV6) && !PKT_IS_IPV6(p)) { + SCLogDebug("ip version didn't match"); + continue; + } + + if (DetectProtoContainsProto(&s->proto, IP_GET_IPPROTO(p)) == 0) { + SCLogDebug("proto didn't match"); + continue; + } + + /* check the source & dst port in the sig */ + if (p->proto == IPPROTO_TCP || p->proto == IPPROTO_UDP || p->proto == IPPROTO_SCTP) { + if (!(s->flags & SIG_FLAG_DP_ANY)) { + if (p->flags & PKT_IS_FRAGMENT) + continue; + + DetectPort *dport = DetectPortLookupGroup(s->dp,p->dp); + if (dport == NULL) { + SCLogDebug("dport didn't match."); + continue; + } + } + if (!(s->flags & SIG_FLAG_SP_ANY)) { + if (p->flags & PKT_IS_FRAGMENT) + continue; + + DetectPort *sport = DetectPortLookupGroup(s->sp,p->sp); + if (sport == NULL) { + SCLogDebug("sport didn't match."); + continue; + } + } + } else if ((s->flags & (SIG_FLAG_DP_ANY|SIG_FLAG_SP_ANY)) != (SIG_FLAG_DP_ANY|SIG_FLAG_SP_ANY)) { + SCLogDebug("port-less protocol and sig needs ports"); + continue; + } + + if (!IPOnlyMatchCompatSMs(tv, det_ctx, s, p)) { + continue; + } + + SCLogDebug("Signum %"PRIu16" match (sid: %"PRIu16", msg: %s)", + u * 8 + i, s->id, s->msg); + + if (s->sm_arrays[DETECT_SM_LIST_POSTMATCH] != NULL) { + KEYWORD_PROFILING_SET_LIST(det_ctx, DETECT_SM_LIST_POSTMATCH); + SigMatchData *smd = s->sm_arrays[DETECT_SM_LIST_POSTMATCH]; + + SCLogDebug("running match functions, sm %p", smd); + + if (smd != NULL) { + while (1) { + KEYWORD_PROFILING_START; + (void)sigmatch_table[smd->type].Match(tv, det_ctx, p, s, smd->ctx); + KEYWORD_PROFILING_END(det_ctx, smd->type, 1); + if (smd->is_last) + break; + smd++; + } + } + } + if (!(s->flags & SIG_FLAG_NOALERT)) { + if (s->action & ACTION_DROP) + PacketAlertAppend(det_ctx, s, p, 0, PACKET_ALERT_FLAG_DROP_FLOW); + else + PacketAlertAppend(det_ctx, s, p, 0, 0); + } else { + /* apply actions for noalert/rule suppressed as well */ + DetectSignatureApplyActions(p, s); + } + } + } + } + } +} + +/** + * \brief Build the radix trees from the lists of parsed adresses in CIDR format + * the result should be 4 radix trees: src/dst ipv4 and src/dst ipv6 + * holding SigNumArrays, each of them with a hierarchical relation + * of subnets and hosts + * + * \param de_ctx Pointer to the current detection engine + */ +void IPOnlyPrepare(DetectEngineCtx *de_ctx) +{ + SCLogDebug("Preparing Final Lists"); + + /* + IPOnlyCIDRListPrint((de_ctx->io_ctx).ip_src); + IPOnlyCIDRListPrint((de_ctx->io_ctx).ip_dst); + */ + + IPOnlyCIDRItem *src, *dst; + SCRadixNode *node = NULL; + + /* Prepare Src radix trees */ + for (src = (de_ctx->io_ctx).ip_src; src != NULL; ) { + if (src->family == AF_INET) { + /* + SCLogDebug("To IPv4"); + SCLogDebug("Item has netmask %"PRIu16" negated: %s; IP: %s; " + "signum: %"PRIu16, src->netmask, + (src->negated) ? "yes":"no", + inet_ntoa( *(struct in_addr*)&src->ip[0]), + src->signum); + */ + + void *user_data = NULL; + if (src->netmask == 32) + (void)SCRadixFindKeyIPV4ExactMatch((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv4src, + &user_data); + else + (void)SCRadixFindKeyIPV4Netblock((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv4src, + src->netmask, &user_data); + if (user_data == NULL) { + SCLogDebug("Exact match not found"); + + /** Not found, look if there's a subnet of this range with + * bigger netmask */ + (void)SCRadixFindKeyIPV4BestMatch((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv4src, + &user_data); + if (user_data == NULL) { + SCLogDebug("best match not found"); + + /* Not found, insert a new one */ + SigNumArray *sna = SigNumArrayNew(de_ctx, &de_ctx->io_ctx); + + /* Update the sig */ + uint8_t tmp = 1 << (src->signum % 8); + + if (src->negated > 0) + /* Unset it */ + sna->array[src->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[src->signum / 8] |= tmp; + + if (src->netmask == 32) + node = SCRadixAddKeyIPV4((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv4src, sna); + else + node = SCRadixAddKeyIPV4Netblock((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv4src, + sna, src->netmask); + + if (node == NULL) + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the " + "src ipv4 radix tree"); + } else { + SCLogDebug("Best match found"); + + /* Found, copy the sig num table, add this signum and insert */ + SigNumArray *sna = NULL; + sna = SigNumArrayCopy((SigNumArray *) user_data); + + /* Update the sig */ + uint8_t tmp = 1 << (src->signum % 8); + + if (src->negated > 0) + /* Unset it */ + sna->array[src->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[src->signum / 8] |= tmp; + + if (src->netmask == 32) + node = SCRadixAddKeyIPV4((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv4src, sna); + else + node = SCRadixAddKeyIPV4Netblock((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv4src, sna, + src->netmask); + + if (node == NULL) { + char tmpstr[64]; + PrintInet(src->family, &src->ip[0], tmpstr, sizeof(tmpstr)); + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the" + " src ipv4 radix tree ip %s netmask %"PRIu8, tmpstr, src->netmask); + //SCRadixPrintTree((de_ctx->io_ctx).tree_ipv4src); + exit(-1); + } + } + } else { + SCLogDebug("Exact match found"); + + /* it's already inserted. Update it */ + SigNumArray *sna = (SigNumArray *)user_data; + + /* Update the sig */ + uint8_t tmp = 1 << (src->signum % 8); + + if (src->negated > 0) + /* Unset it */ + sna->array[src->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[src->signum / 8] |= tmp; + } + } else if (src->family == AF_INET6) { + SCLogDebug("To IPv6"); + + void *user_data = NULL; + if (src->netmask == 128) + (void)SCRadixFindKeyIPV6ExactMatch((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv6src, + &user_data); + else + (void)SCRadixFindKeyIPV6Netblock((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv6src, + src->netmask, &user_data); + + if (user_data == NULL) { + /* Not found, look if there's a subnet of this range with bigger netmask */ + (void)SCRadixFindKeyIPV6BestMatch((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv6src, + &user_data); + + if (user_data == NULL) { + /* Not found, insert a new one */ + SigNumArray *sna = SigNumArrayNew(de_ctx, &de_ctx->io_ctx); + + /* Update the sig */ + uint8_t tmp = 1 << (src->signum % 8); + + if (src->negated > 0) + /* Unset it */ + sna->array[src->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[src->signum / 8] |= tmp; + + if (src->netmask == 128) + node = SCRadixAddKeyIPV6((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv6src, sna); + else + node = SCRadixAddKeyIPV6Netblock((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv6src, + sna, src->netmask); + if (node == NULL) + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the src " + "ipv6 radix tree"); + } else { + /* Found, copy the sig num table, add this signum and insert */ + SigNumArray *sna = NULL; + sna = SigNumArrayCopy((SigNumArray *)user_data); + + /* Update the sig */ + uint8_t tmp = 1 << (src->signum % 8); + if (src->negated > 0) + /* Unset it */ + sna->array[src->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[src->signum / 8] |= tmp; + + if (src->netmask == 128) + node = SCRadixAddKeyIPV6((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv6src, sna); + else + node = SCRadixAddKeyIPV6Netblock((uint8_t *)&src->ip[0], + (de_ctx->io_ctx).tree_ipv6src, + sna, src->netmask); + if (node == NULL) + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the src " + "ipv6 radix tree"); + } + } else { + /* it's already inserted. Update it */ + SigNumArray *sna = (SigNumArray *)user_data; + + /* Update the sig */ + uint8_t tmp = 1 << (src->signum % 8); + if (src->negated > 0) + /* Unset it */ + sna->array[src->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[src->signum / 8] |= tmp; + } + } + IPOnlyCIDRItem *tmpaux = src; + src = src->next; + SCFree(tmpaux); + } + + SCLogDebug("dsts:"); + + /* Prepare Dst radix trees */ + for (dst = (de_ctx->io_ctx).ip_dst; dst != NULL; ) { + if (dst->family == AF_INET) { + + SCLogDebug("To IPv4"); + SCLogDebug("Item has netmask %"PRIu16" negated: %s; IP: %s; signum:" + " %"PRIu16"", dst->netmask, (dst->negated)?"yes":"no", + inet_ntoa(*(struct in_addr*)&dst->ip[0]), dst->signum); + + void *user_data = NULL; + if (dst->netmask == 32) + (void) SCRadixFindKeyIPV4ExactMatch((uint8_t *) &dst->ip[0], + (de_ctx->io_ctx).tree_ipv4dst, + &user_data); + else + (void) SCRadixFindKeyIPV4Netblock((uint8_t *) &dst->ip[0], + (de_ctx->io_ctx).tree_ipv4dst, + dst->netmask, + &user_data); + + if (user_data == NULL) { + SCLogDebug("Exact match not found"); + + /** + * Not found, look if there's a subnet of this range + * with bigger netmask + */ + (void) SCRadixFindKeyIPV4BestMatch((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv4dst, + &user_data); + if (user_data == NULL) { + SCLogDebug("Best match not found"); + + /** Not found, insert a new one */ + SigNumArray *sna = SigNumArrayNew(de_ctx, &de_ctx->io_ctx); + + /** Update the sig */ + uint8_t tmp = 1 << (dst->signum % 8); + if (dst->negated > 0) + /** Unset it */ + sna->array[dst->signum / 8] &= ~tmp; + else + /** Set it */ + sna->array[dst->signum / 8] |= tmp; + + if (dst->netmask == 32) + node = SCRadixAddKeyIPV4((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv4dst, sna); + else + node = SCRadixAddKeyIPV4Netblock((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv4dst, + sna, dst->netmask); + + if (node == NULL) + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the dst " + "ipv4 radix tree"); + } else { + SCLogDebug("Best match found"); + + /* Found, copy the sig num table, add this signum and insert */ + SigNumArray *sna = NULL; + sna = SigNumArrayCopy((SigNumArray *) user_data); + + /* Update the sig */ + uint8_t tmp = 1 << (dst->signum % 8); + if (dst->negated > 0) + /* Unset it */ + sna->array[dst->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[dst->signum / 8] |= tmp; + + if (dst->netmask == 32) + node = SCRadixAddKeyIPV4((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv4dst, sna); + else + node = SCRadixAddKeyIPV4Netblock((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv4dst, + sna, dst->netmask); + + if (node == NULL) + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the dst " + "ipv4 radix tree"); + } + } else { + SCLogDebug("Exact match found"); + + /* it's already inserted. Update it */ + SigNumArray *sna = (SigNumArray *)user_data; + + /* Update the sig */ + uint8_t tmp = 1 << (dst->signum % 8); + if (dst->negated > 0) + /* Unset it */ + sna->array[dst->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[dst->signum / 8] |= tmp; + } + } else if (dst->family == AF_INET6) { + SCLogDebug("To IPv6"); + + void *user_data = NULL; + if (dst->netmask == 128) + (void) SCRadixFindKeyIPV6ExactMatch((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv6dst, + &user_data); + else + (void) SCRadixFindKeyIPV6Netblock((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv6dst, + dst->netmask, &user_data); + + if (user_data == NULL) { + /** Not found, look if there's a subnet of this range with + * bigger netmask + */ + (void) SCRadixFindKeyIPV6BestMatch((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv6dst, + &user_data); + + if (user_data == NULL) { + /* Not found, insert a new one */ + SigNumArray *sna = SigNumArrayNew(de_ctx, &de_ctx->io_ctx); + + /* Update the sig */ + uint8_t tmp = 1 << (dst->signum % 8); + if (dst->negated > 0) + /* Unset it */ + sna->array[dst->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[dst->signum / 8] |= tmp; + + if (dst->netmask == 128) + node = SCRadixAddKeyIPV6((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv6dst, sna); + else + node = SCRadixAddKeyIPV6Netblock((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv6dst, + sna, dst->netmask); + + if (node == NULL) + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the dst " + "ipv6 radix tree"); + } else { + /* Found, copy the sig num table, add this signum and insert */ + SigNumArray *sna = NULL; + sna = SigNumArrayCopy((SigNumArray *)user_data); + + /* Update the sig */ + uint8_t tmp = 1 << (dst->signum % 8); + if (dst->negated > 0) + /* Unset it */ + sna->array[dst->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[dst->signum / 8] |= tmp; + + if (dst->netmask == 128) + node = SCRadixAddKeyIPV6((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv6dst, sna); + else + node = SCRadixAddKeyIPV6Netblock((uint8_t *)&dst->ip[0], + (de_ctx->io_ctx).tree_ipv6dst, + sna, dst->netmask); + + if (node == NULL) + SCLogError(SC_ERR_IPONLY_RADIX, "Error inserting in the dst " + "ipv6 radix tree"); + } + } else { + /* it's already inserted. Update it */ + SigNumArray *sna = (SigNumArray *)user_data; + + /* Update the sig */ + uint8_t tmp = 1 << (dst->signum % 8); + if (dst->negated > 0) + /* Unset it */ + sna->array[dst->signum / 8] &= ~tmp; + else + /* Set it */ + sna->array[dst->signum / 8] |= tmp; + } + } + IPOnlyCIDRItem *tmpaux = dst; + dst = dst->next; + SCFree(tmpaux); + } + + /* print all the trees: for debuggin it might print too much info + SCLogDebug("Radix tree src ipv4:"); + SCRadixPrintTree((de_ctx->io_ctx).tree_ipv4src); + SCLogDebug("Radix tree src ipv6:"); + SCRadixPrintTree((de_ctx->io_ctx).tree_ipv6src); + SCLogDebug("__________________"); + + SCLogDebug("Radix tree dst ipv4:"); + SCRadixPrintTree((de_ctx->io_ctx).tree_ipv4dst); + SCLogDebug("Radix tree dst ipv6:"); + SCRadixPrintTree((de_ctx->io_ctx).tree_ipv6dst); + SCLogDebug("__________________"); + */ +} + +/** + * \brief Add a signature to the lists of Adrresses in CIDR format (sorted) + * this step is necesary to build the radix tree with a hierarchical + * relation between nodes + * \param de_ctx Pointer to the current detection engine context + * \param de_ctx Pointer to the current ip only detection engine contest + * \param s Pointer to the current signature + */ +void IPOnlyAddSignature(DetectEngineCtx *de_ctx, DetectEngineIPOnlyCtx *io_ctx, + Signature *s) +{ + if (!(s->flags & SIG_FLAG_IPONLY)) + return; + + /* Set the internal signum to the list before merging */ + IPOnlyCIDRListSetSigNum(s->CidrSrc, s->num); + + IPOnlyCIDRListSetSigNum(s->CidrDst, s->num); + + /** + * ipv4 and ipv6 are mixed, but later we will separate them into + * different trees + */ + io_ctx->ip_src = IPOnlyCIDRItemInsert(io_ctx->ip_src, s->CidrSrc); + io_ctx->ip_dst = IPOnlyCIDRItemInsert(io_ctx->ip_dst, s->CidrDst); + + if (s->num > io_ctx->max_idx) + io_ctx->max_idx = s->num; + + /* enable the sig in the bitarray */ + io_ctx->sig_init_array[(s->num/8)] |= 1 << (s->num % 8); + + /** no longer ref to this, it's in the table now */ + s->CidrSrc = NULL; + s->CidrDst = NULL; +} + +#ifdef UNITTESTS +/** + * \test check that we set a Signature as IPOnly because it has no rule + * option appending a SigMatch and no port is fixed + */ + +static int IPOnlyTestSig01(void) +{ + int result = 0; + DetectEngineCtx de_ctx; + + memset(&de_ctx, 0, sizeof(DetectEngineCtx)); + + de_ctx.flags |= DE_QUIET; + + Signature *s = SigInit(&de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-01 sig is IPOnly \"; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(&de_ctx, s)) + result = 1; + else + printf("expected a IPOnly signature: "); + + SigFree(s); +end: + return result; +} + +/** + * \test check that we dont set a Signature as IPOnly because it has no rule + * option appending a SigMatch but a port is fixed + */ + +static int IPOnlyTestSig02 (void) +{ + int result = 0; + DetectEngineCtx de_ctx; + memset (&de_ctx, 0, sizeof(DetectEngineCtx)); + + memset(&de_ctx, 0, sizeof(DetectEngineCtx)); + + de_ctx.flags |= DE_QUIET; + + Signature *s = SigInit(&de_ctx,"alert tcp any any -> any 80 (msg:\"SigTest40-02 sig is not IPOnly \"; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if ((SignatureIsIPOnly(&de_ctx, s))) + result = 1; + else + printf("got a non-IPOnly signature: "); + + SigFree(s); + +end: + return result; +} + +/** + * \test check that we set dont set a Signature as IPOnly + * because it has rule options appending a SigMatch like content, and pcre + */ + +static int IPOnlyTestSig03 (void) +{ + int result = 1; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + /* combination of pcre and content */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (pcre and content) \"; content:\"php\"; pcre:\"/require(_once)?/i\"; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (content): "); + result=0; + } + SigFree(s); + + /* content */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (content) \"; content:\"match something\"; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (content): "); + result=0; + } + SigFree(s); + + /* uricontent */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (uricontent) \"; uricontent:\"match something\"; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (uricontent): "); + result=0; + } + SigFree(s); + + /* pcre */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (pcre) \"; pcre:\"/e?idps rule[sz]/i\"; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (pcre): "); + result=0; + } + SigFree(s); + + /* flow */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (flow) \"; flow:to_server; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (flow): "); + result=0; + } + SigFree(s); + + /* dsize */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (dsize) \"; dsize:100; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (dsize): "); + result=0; + } + SigFree(s); + + /* flowbits */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (flowbits) \"; flowbits:unset; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (flowbits): "); + result=0; + } + SigFree(s); + + /* flowvar */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (flowvar) \"; pcre:\"/(?<flow_var>.*)/i\"; flowvar:var,\"str\"; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (flowvar): "); + result=0; + } + SigFree(s); + + /* pktvar */ + s = SigInit(de_ctx,"alert tcp any any -> any any (msg:\"SigTest40-03 sig is not IPOnly (pktvar) \"; pcre:\"/(?<pkt_var>.*)/i\"; pktvar:var,\"str\"; classtype:misc-activity; sid:400001; rev:1;)"); + if (s == NULL) { + goto end; + } + if(SignatureIsIPOnly(de_ctx, s)) + { + printf("got a IPOnly signature (pktvar): "); + result=0; + } + SigFree(s); + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test + */ +static int IPOnlyTestSig04 (void) +{ + int result = 1; + + IPOnlyCIDRItem *head = NULL; + IPOnlyCIDRItem *new; + + new = IPOnlyCIDRItemNew(); + new->netmask= 10; + + head = IPOnlyCIDRItemInsert(head, new); + + new = IPOnlyCIDRItemNew(); + new->netmask= 11; + + head = IPOnlyCIDRItemInsert(head, new); + + new = IPOnlyCIDRItemNew(); + new->netmask= 9; + + head = IPOnlyCIDRItemInsert(head, new); + + new = IPOnlyCIDRItemNew(); + new->netmask= 10; + + head = IPOnlyCIDRItemInsert(head, new); + + new = IPOnlyCIDRItemNew(); + new->netmask= 10; + + head = IPOnlyCIDRItemInsert(head, new); + + IPOnlyCIDRListPrint(head); + new = head; + if (new->netmask != 9) { + result = 0; + goto end; + } + new = new->next; + if (new->netmask != 10) { + result = 0; + goto end; + } + new = new->next; + if (new->netmask != 10) { + result = 0; + goto end; + } + new = new->next; + if (new->netmask != 10) { + result = 0; + goto end; + } + new = new->next; + if (new->netmask != 11) { + result = 0; + goto end; + } + +end: + IPOnlyCIDRListFree(head); + return result; +} + +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (all should match) + */ +int IPOnlyTestSig05(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 7; + + Packet *p[1]; + + p[0] = UTHBuildPacket((uint8_t *)buf, buflen, IPPROTO_TCP); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 192.168.1.5 any -> any any (msg:\"Testing src ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp any any -> 192.168.1.1 any (msg:\"Testing dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp 192.168.1.5 any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp 192.168.1.5 any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp 192.168.1.0/24 any -> any any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp 192.168.1.0/24 any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 7)\"; content:\"Hi all\";sid:7;)"; + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[7] = { 1, 1, 1, 1, 1, 1, 1}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (none should match) + */ +int IPOnlyTestSig06(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 7; + + Packet *p[1]; + + p[0] = UTHBuildPacketSrcDst((uint8_t *)buf, buflen, IPPROTO_TCP, "80.58.0.33", "195.235.113.3"); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 192.168.1.5 any -> any any (msg:\"Testing src ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp any any -> 192.168.1.1 any (msg:\"Testing dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp 192.168.1.5 any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp 192.168.1.5 any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp 192.168.1.0/24 any -> any any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp 192.168.1.0/24 any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 7)\"; content:\"Hi all\";sid:7;)"; + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[7] = { 0, 0, 0, 0, 0, 0, 0}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +/* \todo fix it. We have disabled this unittest because 599 exposes 608, + * which is why these unittests fail. When we fix 608, we need to renable + * these sigs */ +#if 0 +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (all should match) + */ +int IPOnlyTestSig07(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 7; + + Packet *p[1]; + + p[0] = UTHBuildPacket((uint8_t *)buf, buflen, IPPROTO_TCP); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 192.168.1.5 any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp [192.168.1.2,192.168.1.5,192.168.1.4] any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp [192.168.1.0/24,!192.168.1.1] any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp [192.0.0.0/8,!192.168.0.0/16,192.168.1.0/24,!192.168.1.1] any -> [192.168.1.0/24,!192.168.1.5] any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp any any -> any any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> [192.168.0.0/16,!192.168.1.0/24,192.168.1.1] any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp [78.129.202.0/24,192.168.1.5,78.129.205.64,78.129.214.103,78.129.223.19,78.129.233.17,78.137.168.33,78.140.132.11,78.140.133.15,78.140.138.105,78.140.139.105,78.140.141.107,78.140.141.114,78.140.143.103,78.140.143.13,78.140.145.144,78.140.170.164,78.140.23.18,78.143.16.7,78.143.46.124,78.157.129.71] any -> 192.168.1.1 any (msg:\"ET RBN Known Russian Business Network IP TCP - BLOCKING (246)\"; sid:7;)"; /* real sid:"2407490" */ + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[7] = { 1, 1, 1, 1, 1, 1, 1}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} +#endif + +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (none should match) + */ +int IPOnlyTestSig08(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 7; + + Packet *p[1]; + + p[0] = UTHBuildPacketSrcDst((uint8_t *)buf, buflen, IPPROTO_TCP,"192.168.1.1","192.168.1.5"); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 192.168.1.5 any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp [192.168.1.2,192.168.1.5,192.168.1.4] any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp [192.168.1.0/24,!192.168.1.1] any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp [192.0.0.0/8,!192.168.0.0/16,192.168.1.0/24,!192.168.1.1] any -> [192.168.1.0/24,!192.168.1.5] any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp any any -> !192.168.1.5 any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> [192.168.0.0/16,!192.168.1.0/24,192.168.1.1] any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp [78.129.202.0/24,192.168.1.5,78.129.205.64,78.129.214.103,78.129.223.19,78.129.233.17,78.137.168.33,78.140.132.11,78.140.133.15,78.140.138.105,78.140.139.105,78.140.141.107,78.140.141.114,78.140.143.103,78.140.143.13,78.140.145.144,78.140.170.164,78.140.23.18,78.143.16.7,78.143.46.124,78.157.129.71] any -> 192.168.1.1 any (msg:\"ET RBN Known Russian Business Network IP TCP - BLOCKING (246)\"; sid:7;)"; /* real sid:"2407490" */ + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[7] = { 0, 0, 0, 0, 0, 0, 0}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (all should match) + */ +int IPOnlyTestSig09(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 7; + + Packet *p[1]; + + p[0] = UTHBuildPacketIPV6SrcDst((uint8_t *)buf, buflen, IPPROTO_TCP, "3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565", "3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562"); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565 any -> any any (msg:\"Testing src ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp any any -> 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562 any (msg:\"Testing dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565 any -> 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562 any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565 any -> 3FFE:FFFF:7654:FEDA:1245:BA98:3210:0/96 any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp 3FFE:FFFF:7654:FEDA:0:0:0:0/64 any -> any any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> 3FFE:FFFF:7654:FEDA:0:0:0:0/64 any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp 3FFE:FFFF:7654:FEDA:0:0:0:0/64 any -> 3FFE:FFFF:7654:FEDA:0:0:0:0/64 any (msg:\"Testing src/dst ip (sid 7)\"; content:\"Hi all\";sid:7;)"; + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[7] = { 1, 1, 1, 1, 1, 1, 1}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (none should match) + */ +int IPOnlyTestSig10(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 7; + + Packet *p[1]; + + p[0] = UTHBuildPacketIPV6SrcDst((uint8_t *)buf, buflen, IPPROTO_TCP, "3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562", "3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565"); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565 any -> any any (msg:\"Testing src ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp any any -> 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562 any (msg:\"Testing dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565 any -> 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562 any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565 any -> !3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562/96 any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp !3FFE:FFFF:7654:FEDA:0:0:0:0/64 any -> any any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> !3FFE:FFFF:7654:FEDA:0:0:0:0/64 any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp 3FFE:FFFF:7654:FEDA:0:0:0:0/64 any -> 3FFE:FFFF:7654:FEDB:0:0:0:0/64 any (msg:\"Testing src/dst ip (sid 7)\"; content:\"Hi all\";sid:7;)"; + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[7] = { 0, 0, 0, 0, 0, 0, 0}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +/* \todo fix it. We have disabled this unittest because 599 exposes 608, + * which is why these unittests fail. When we fix 608, we need to renable + * these sigs */ +#if 0 +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (all should match) with ipv4 and ipv6 mixed + */ +int IPOnlyTestSig11(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 2; + uint8_t numsigs = 7; + + Packet *p[2]; + + p[0] = UTHBuildPacketIPV6SrcDst((uint8_t *)buf, buflen, IPPROTO_TCP, "3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565", "3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562"); + p[1] = UTHBuildPacketSrcDst((uint8_t *)buf, buflen, IPPROTO_TCP,"192.168.1.1","192.168.1.5"); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565,192.168.1.1 any -> 3FFE:FFFF:7654:FEDA:0:0:0:0/64,192.168.1.5 any (msg:\"Testing src/dst ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp [192.168.1.1,3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565,192.168.1.4,192.168.1.5,!192.168.1.0/24] any -> [3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.0/24] any (msg:\"Testing src/dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp [3FFE:FFFF:7654:FEDA:0:0:0:0/64,!3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.1] any -> [3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.5] any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp [3FFE:FFFF:0:0:0:0:0:0/32,!3FFE:FFFF:7654:FEDA:0:0:0:0/64,3FFE:FFFF:7654:FEDA:0:0:0:0/64,!3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.1] any -> [3FFE:FFFF:7654:FEDA:0:0:0:0/64,192.168.1.0/24,!3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565] any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp any any -> any any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> [3FFE:FFFF:7654:FEDA:0:0:0:0/64,!3FFE:FFFF:7654:FEDA:0:0:0:0/64,3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.5] any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp [78.129.202.0/24,3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565,192.168.1.1,78.129.205.64,78.129.214.103,78.129.223.19,78.129.233.17,78.137.168.33,78.140.132.11,78.140.133.15,78.140.138.105,78.140.139.105,78.140.141.107,78.140.141.114,78.140.143.103,78.140.143.13,78.140.145.144,78.140.170.164,78.140.23.18,78.143.16.7,78.143.46.124,78.157.129.71] any -> [3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.0.0.0/8] any (msg:\"ET RBN Known Russian Business Network IP TCP - BLOCKING (246)\"; sid:7;)"; /* real sid:"2407490" */ + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[2][7] = {{ 1, 1, 1, 1, 1, 1, 1}, { 1, 1, 1, 1, 1, 1, 1}}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} +#endif + +/** + * \test Test a set of ip only signatures making use a lot of + * addresses for src and dst (none should match) with ipv4 and ipv6 mixed + */ +int IPOnlyTestSig12(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 2; + uint8_t numsigs = 7; + + Packet *p[2]; + + p[0] = UTHBuildPacketIPV6SrcDst((uint8_t *)buf, buflen, IPPROTO_TCP,"3FBE:FFFF:7654:FEDA:1245:BA98:3210:4562","3FBE:FFFF:7654:FEDA:1245:BA98:3210:4565"); + p[1] = UTHBuildPacketSrcDst((uint8_t *)buf, buflen, IPPROTO_TCP,"195.85.1.1","80.198.1.5"); + + char *sigs[numsigs]; + sigs[0]= "alert tcp 3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565,192.168.1.1 any -> 3FFE:FFFF:7654:FEDA:0:0:0:0/64,192.168.1.5 any (msg:\"Testing src/dst ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp [192.168.1.1,3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565,192.168.1.4,192.168.1.5,!192.168.1.0/24] any -> [3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.0/24] any (msg:\"Testing src/dst ip (sid 2)\"; sid:2;)"; + sigs[2]= "alert tcp [3FFE:FFFF:7654:FEDA:0:0:0:0/64,!3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.1] any -> [3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.5] any (msg:\"Testing src/dst ip (sid 3)\"; sid:3;)"; + sigs[3]= "alert tcp [3FFE:FFFF:0:0:0:0:0:0/32,!3FFE:FFFF:7654:FEDA:0:0:0:0/64,3FFE:FFFF:7654:FEDA:0:0:0:0/64,!3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.1] any -> [3FFE:FFFF:7654:FEDA:0:0:0:0/64,192.168.1.0/24,!3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565] any (msg:\"Testing src/dst ip (sid 4)\"; sid:4;)"; + sigs[4]= "alert tcp any any -> [!3FBE:FFFF:7654:FEDA:1245:BA98:3210:4565,!80.198.1.5] any (msg:\"Testing src/dst ip (sid 5)\"; sid:5;)"; + sigs[5]= "alert tcp any any -> [3FFE:FFFF:7654:FEDA:0:0:0:0/64,!3FFE:FFFF:7654:FEDA:0:0:0:0/64,3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.168.1.5] any (msg:\"Testing src/dst ip (sid 6)\"; sid:6;)"; + sigs[6]= "alert tcp [78.129.202.0/24,3FFE:FFFF:7654:FEDA:1245:BA98:3210:4565,192.168.1.1,78.129.205.64,78.129.214.103,78.129.223.19,78.129.233.17,78.137.168.33,78.140.132.11,78.140.133.15,78.140.138.105,78.140.139.105,78.140.141.107,78.140.141.114,78.140.143.103,78.140.143.13,78.140.145.144,78.140.170.164,78.140.23.18,78.143.16.7,78.143.46.124,78.157.129.71] any -> [3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562,192.0.0.0/8] any (msg:\"ET RBN Known Russian Business Network IP TCP - BLOCKING (246)\"; sid:7;)"; /* real sid:"2407490" */ + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[2][7] = {{ 0, 0, 0, 0, 0, 0, 0}, {0, 0, 0, 0, 0, 0, 0}}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +static int IPOnlyTestSig13(void) +{ + int result = 0; + DetectEngineCtx de_ctx; + + memset(&de_ctx, 0, sizeof(DetectEngineCtx)); + + de_ctx.flags |= DE_QUIET; + + Signature *s = SigInit(&de_ctx, + "alert tcp any any -> any any (msg:\"Test flowbits ip only\"; " + "flowbits:set,myflow1; sid:1; rev:1;)"); + if (s == NULL) { + goto end; + } + if (SignatureIsIPOnly(&de_ctx, s)) + result = 1; + else + printf("expected a IPOnly signature: "); + + SigFree(s); +end: + return result; +} + +static int IPOnlyTestSig14(void) +{ + int result = 0; + DetectEngineCtx de_ctx; + + memset(&de_ctx, 0, sizeof(DetectEngineCtx)); + + de_ctx.flags |= DE_QUIET; + + Signature *s = SigInit(&de_ctx, + "alert tcp any any -> any any (msg:\"Test flowbits ip only\"; " + "flowbits:set,myflow1; flowbits:isset,myflow2; sid:1; rev:1;)"); + if (s == NULL) { + goto end; + } + if (SignatureIsIPOnly(&de_ctx, s)) + printf("expected a IPOnly signature: "); + else + result = 1; + + SigFree(s); +end: + return result; +} + +int IPOnlyTestSig15(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 7; + + Packet *p[1]; + Flow f; + GenericVar flowvar; + memset(&f, 0, sizeof(Flow)); + memset(&flowvar, 0, sizeof(GenericVar)); + FLOW_INITIALIZE(&f); + + p[0] = UTHBuildPacket((uint8_t *)buf, buflen, IPPROTO_TCP); + + p[0]->flow = &f; + p[0]->flow->flowvar = &flowvar; + p[0]->flags |= PKT_HAS_FLOW; + p[0]->flowflags |= FLOW_PKT_TOSERVER; + + char *sigs[numsigs]; + sigs[0]= "alert tcp 192.168.1.5 any -> any any (msg:\"Testing src ip (sid 1)\"; " + "flowbits:set,one; sid:1;)"; + sigs[1]= "alert tcp any any -> 192.168.1.1 any (msg:\"Testing dst ip (sid 2)\"; " + "flowbits:set,two; sid:2;)"; + sigs[2]= "alert tcp 192.168.1.5 any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 3)\"; " + "flowbits:set,three; sid:3;)"; + sigs[3]= "alert tcp 192.168.1.5 any -> 192.168.1.1 any (msg:\"Testing src/dst ip (sid 4)\"; " + "flowbits:set,four; sid:4;)"; + sigs[4]= "alert tcp 192.168.1.0/24 any -> any any (msg:\"Testing src/dst ip (sid 5)\"; " + "flowbits:set,five; sid:5;)"; + sigs[5]= "alert tcp any any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 6)\"; " + "flowbits:set,six; sid:6;)"; + sigs[6]= "alert tcp 192.168.1.0/24 any -> 192.168.0.0/16 any (msg:\"Testing src/dst ip (sid 7)\"; " + "flowbits:set,seven; content:\"Hi all\"; sid:7;)"; + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[7] = { 1, 2, 3, 4, 5, 6, 7}; + uint32_t results[7] = { 1, 1, 1, 1, 1, 1, 1}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + FLOW_DESTROY(&f); + return result; +} + +/** + * \brief Unittest to show #599. We fail to match if we have negated addresses. + */ +int IPOnlyTestSig16(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 2; + + Packet *p[1]; + + p[0] = UTHBuildPacketSrcDst((uint8_t *)buf, buflen, IPPROTO_TCP, "100.100.0.0", "50.0.0.0"); + + char *sigs[numsigs]; + sigs[0]= "alert tcp !100.100.0.1 any -> any any (msg:\"Testing src ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert tcp any any -> !50.0.0.1 any (msg:\"Testing dst ip (sid 2)\"; sid:2;)"; + + /* Sid numbers (we could extract them from the sig) */ + uint32_t sid[2] = { 1, 2}; + uint32_t results[2] = { 1, 1}; + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +/** + * \brief Unittest to show #611. Ports on portless protocols. + */ +int IPOnlyTestSig17(void) +{ + int result = 0; + uint8_t *buf = (uint8_t *)"Hi all!"; + uint16_t buflen = strlen((char *)buf); + + uint8_t numpkts = 1; + uint8_t numsigs = 2; + + Packet *p[1]; + + p[0] = UTHBuildPacketSrcDst((uint8_t *)buf, buflen, IPPROTO_ICMP, "100.100.0.0", "50.0.0.0"); + + char *sigs[numsigs]; + sigs[0]= "alert ip 100.100.0.0 80 -> any any (msg:\"Testing src ip (sid 1)\"; sid:1;)"; + sigs[1]= "alert ip any any -> 50.0.0.0 123 (msg:\"Testing dst ip (sid 2)\"; sid:2;)"; + + uint32_t sid[2] = { 1, 2}; + uint32_t results[2] = { 0, 0}; /* neither should match */ + + result = UTHGenericTest(p, numpkts, sigs, sid, (uint32_t *) results, numsigs); + + UTHFreePackets(p, numpkts); + + return result; +} + +#endif /* UNITTESTS */ + +void IPOnlyRegisterTests(void) +{ +#ifdef UNITTESTS + UtRegisterTest("IPOnlyTestSig01", IPOnlyTestSig01, 1); + UtRegisterTest("IPOnlyTestSig02", IPOnlyTestSig02, 1); + UtRegisterTest("IPOnlyTestSig03", IPOnlyTestSig03, 1); + UtRegisterTest("IPOnlyTestSig04", IPOnlyTestSig04, 1); + + UtRegisterTest("IPOnlyTestSig05", IPOnlyTestSig05, 1); + UtRegisterTest("IPOnlyTestSig06", IPOnlyTestSig06, 1); +/* \todo fix it. We have disabled this unittest because 599 exposes 608, + * which is why these unittests fail. When we fix 608, we need to renable + * these sigs */ +#if 0 + UtRegisterTest("IPOnlyTestSig07", IPOnlyTestSig07, 1); +#endif + UtRegisterTest("IPOnlyTestSig08", IPOnlyTestSig08, 1); + + UtRegisterTest("IPOnlyTestSig09", IPOnlyTestSig09, 1); + UtRegisterTest("IPOnlyTestSig10", IPOnlyTestSig10, 1); +/* \todo fix it. We have disabled this unittest because 599 exposes 608, + * which is why these unittests fail. When we fix 608, we need to renable + * these sigs */ +#if 0 + UtRegisterTest("IPOnlyTestSig11", IPOnlyTestSig11, 1); +#endif + UtRegisterTest("IPOnlyTestSig12", IPOnlyTestSig12, 1); + UtRegisterTest("IPOnlyTestSig13", IPOnlyTestSig13, 1); + UtRegisterTest("IPOnlyTestSig14", IPOnlyTestSig14, 1); + UtRegisterTest("IPOnlyTestSig15", IPOnlyTestSig15, 1); + UtRegisterTest("IPOnlyTestSig16", IPOnlyTestSig16, 1); + + UtRegisterTest("IPOnlyTestSig17", IPOnlyTestSig17, 1); +#endif + + return; +} + |